Robust Protection of Networks against Cascading Phenomena

Recently, the spread of many different undesirable phenomena has been modeled as a network diffusion process cascade, e.g. misinformation spread in social networks, dissemination of infectious disease through different regions, virus and malware propagation through computer networks, expansion of fire in forests and towns, spread of invasive species across landscape etc. The consequences of such spreads can be severe and hence it is important to design and develop efficient ways of protection. In this thesis, we address the problem of robust network protection against the spread of such cascades. Particularly, we look at the robust protection against a set of the most undesirable cascades, where our goal is to block the smallest possible set of nodes that is robust against the worst possible spread of these cascades. We propose an efficient approximation algorithm that based on a greedy strategy, finds a near-optimal solution for a given set of cascades. Moreover, we design an efficient iterative procedure that incorporates this algorithm. The procedure allows the greedy algorithm to find a near-optimal solution by considering a relatively small number of the given cascades. We also look at different protection actions to which we refer as blocking mechanisms. The types of blocking mechanisms that we consider here are “static”, i.e. not-spreading, and “dynamic”, where once a node is blocked it influences other nodes to become “blocking nodes” as well. We use large real-world networks to evaluate our procedure. Empirical results show that our procedure significantly outperforms well-known heuristics for all considered blocking mechanisms.

[1]  Amin Saberi,et al.  On the spread of viruses on the internet , 2005, SODA '05.

[2]  Roger Wattenhofer,et al.  Word of Mouth: Rumor Dissemination in Social Networks , 2008, SIROCCO.

[3]  Andreas Krause,et al.  Cost-effective outbreak detection in networks , 2007, KDD '07.

[4]  Shishir Bharathi,et al.  Competitive Influence Maximization in Social Networks , 2007, WINE.

[5]  Robert E. Tarjan,et al.  Fast Algorithms for Finding Nearest Common Ancestors , 1984, SIAM J. Comput..

[6]  Ahmed Helmy,et al.  Encounter-based worms: analysis and defense , 2006, 2006 2nd IEEE Workshop on Wireless Mesh Networks.

[7]  Stefan Schmid,et al.  On the windfall of friendship: inoculation strategies on social networks , 2008, EC '08.

[8]  M. L. Fisher,et al.  An analysis of approximations for maximizing submodular set functions—I , 1978, Math. Program..

[9]  Divyakant Agrawal,et al.  Limiting the spread of misinformation in social networks , 2011, WWW.

[10]  Chaitanya Swamy,et al.  Approximability of the Firefighter Problem , 2012, Algorithmica.

[11]  Wei Xu,et al.  Toward worm detection in online social networks , 2010, ACSAC '10.

[12]  Stefan M. Wild,et al.  Maximizing influence in a competitive social network: a follower's perspective , 2007, ICEC.

[13]  Aravind Srinivasan,et al.  Modelling disease outbreaks in realistic urban social networks , 2004, Nature.

[14]  Wei Chen,et al.  Efficient influence maximization in social networks , 2009, KDD.

[15]  Pradeep Dubey,et al.  Competing for Customers in a Social Network: The Quasi-linear Case , 2006, WINE.

[16]  Matthew Richardson,et al.  Mining knowledge-sharing sites for viral marketing , 2002, KDD.

[17]  Michael A. Bender,et al.  The LCA Problem Revisited , 2000, LATIN.

[18]  Laurence A. Wolsey,et al.  An analysis of the greedy algorithm for the submodular set covering problem , 1982, Comb..

[19]  Andreas Krause,et al.  Submodular Function Maximization , 2014, Tractability.

[20]  David Kempe,et al.  Unbalanced Graph Cuts , 2005, ESA.

[21]  Jure Leskovec,et al.  Inferring networks of diffusion and influence , 2010, KDD.

[22]  M. Mitzenmacher,et al.  Probability and Computing: Chernoff Bounds , 2005 .

[23]  Po-An Chen,et al.  Better vaccination strategies for better people , 2010, EC '10.

[24]  Alexander Shapiro,et al.  A simulation-based approach to two-stage stochastic programming with recourse , 1998, Math. Program..

[25]  Nam P. Nguyen,et al.  Containment of misinformation spread in online social networks , 2012, WebSci '12.

[26]  Toshihiro Fujito,et al.  Approximation algorithms for submodular set cover with applications , 2000 .

[27]  Masahiro Kimura,et al.  Minimizing the Spread of Contamination by Blocking Links in a Network , 2008, AAAI.

[28]  James Aspnes,et al.  Inoculation strategies for victims of viruses and the sum-of-squares partition problem , 2005, SODA '05.

[29]  A. Barabasi,et al.  Halting viruses in scale-free networks. , 2001, Physical review. E, Statistical, nonlinear, and soft matter physics.

[30]  Gwen Spencer Robust Cuts Over Time: Combatting the Spread of Invasive Species with Unreliable Biological Control , 2012, AAAI.

[31]  Alexander Grey,et al.  The Mathematical Theory of Infectious Diseases and Its Applications , 1977 .

[32]  Donald F. Towsley,et al.  The effect of network topology on the spread of epidemics , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[33]  H. B. McMahan,et al.  Robust Submodular Observation Selection , 2008 .

[34]  Masahiro Kimura,et al.  Extracting Influential Nodes for Information Diffusion on a Social Network , 2007, AAAI.

[35]  Matthew Richardson,et al.  Mining the network value of customers , 2001, KDD '01.

[36]  David B. Shmoys,et al.  Maximizing the Spread of Cascades Using Network Design , 2010, UAI.

[37]  Yifei Yuan,et al.  Scalable Influence Maximization in Social Networks under the Linear Threshold Model , 2010, 2010 IEEE International Conference on Data Mining.